Chaining Mobility Models for AOMDV and DSDV protocols in FANETs

Size: px
Start display at page:

Download "Chaining Mobility Models for AOMDV and DSDV protocols in FANETs"

Transcription

1 Chaining Mobility Models for AOMDV and DSDV protocols in FANETs Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering In Computer Science and Engineering Submitted By Neha Mittal ( ) Under the supervision of: Dr. Ashima Singh Assistant Professor COMPUTER SCIENCE AND ENGINEERING DEPARTMENT THAPAR UNIVERSITY PATIALA July 2017

2 Scanned by CamScanner

3 Abstract Flying Ad-hoc Networks are the subtype of MANETs where the collection of Unmanned Aerial Vehicles (UAV) communicates with each other for sharing the information. The mobility models are designed to represent the movement of nodes. The major role of mobility model is to create a realistic simulation environment and evaluate the performance of different routing protocols. The performance of routing protocols varies according to the mobility models. The main purpose of this research is to propose a new chain mobility model integrating existing Random Waypoint Mobility Model and Gauss-Markov Mobility Model. These protocols are analyzed for using purpose mobility chain in terms of different Quality of Service parameters such as Packet Delivery Ratio, End-To-End Delay, and Throughput. The main objective of this thesis is to analyze the performance of two routing protocols of FANETs are AOMDV (reactive) and DSDV (proactive) under the different mobility models. The performance of AOMDV and DSDV routing protocols are analyzed under the Random Waypoint, Gauss-Markov, and the proposed Chain Mobility Model. The simulation can be done by using an NS-2 simulator. The results show that AOMDV protocol performed better in terms of PDR but the DSDV performed better in End-To-End Delay when the number of nodes increases under the proposed Chain Mobility Model rather than the Random Waypoint and Gauss- Markov Mobility Model. ii

4 Acknowledgement First of all, I would like to thank the Almighty, who has always guided me to work on the right path of the life. It is a great privilege to express my gratitude and admiration towards my respected supervisor Dr. Ashima Singh, Assistant Professor, Computer Science & Engineering Department. She has been an esteemed guide and great support behind achieving this task. This work would not have been possible without the encouragement and able guidance of her. I also thank my supervisor for her time, patience, discussions and valuable comments. Her enthusiasm and optimism made this experience both rewarding and enjoyable. I am truly grateful to her for extending her total co-operation and understanding whenever I needed help and guidance from her. I am also heartily thankful to Dr. Maninder Singh, Associate Professor and Head, Computer Science & Engineering Department and Dr. Ashutosh Mishra, PG coordinator, for motivation and providing uncanny guidance and support throughout the preparation of the thesis report. I will be failing in my duty if I do not express my gratitude to Dr. S. S. Bhatia, Senior Professor and Dean of Academic Affairs, for making provisions of infrastructure such as library facilities, computer labs equipped with net facilities, immensely useful for the learners to equip themselves with the latest in the field. I am also thankful to the entire faculty and staff members of Computer Science and Engineering Department for their direct-indirect help, cooperation, love, and affection, which made my stay at Thapar University memorable. Last but not least, I would like to thank my family for their wonderful love and encouragement, without their blessings none of this would have been possible. Neha Mittal ( ) iii

5 Table of Contents Table of Contents Page No. Certificate... i Abstract..... ii Acknowledgement......iii Table of Contents iv List of Figures..vi List of Tables.. vii List of Abbreviations...viii Chapter 1: Introduction Wireless Network Benefits of Wireless Network Types of Wireless Network Infrastructure Based Wireless Network Infrastructure-less Based Wireless Network Wireless Ad-hoc Network Wireless Mesh Network Wireless Sensor Network Mobile Ad-hoc Network VANETs FANETs Applications of FANETs Comparison between MANETs, VANETs, and FANETs Routing Protocols Working of AOMDV Working of DSDV Organization of Thesis Summary.. 10 Chapter 2: Literature Survey Routing Protocols in FANETs iv

6 2.1.1 Topology-Based Reactive Based Routing Proactive Based Routing Position Based Routing Geo-Cast Based Routing Broadcast-Based Routing Cluster Based Routing Mobility models in FANETs Random Waypoint Mobility Model Gauss-Markov Mobility Model Semi Random Circular Movement Model Mission Plan Based Model Chain Mobility Model Summary Chapter 3: Problem Statement and Objective Research Gaps Problem Statement Objective Methodology Summary Chapter 4: Proposed Model Components of Proposed Chain mobility model Random Waypoint Model Gauss-Markov Model Proposed Chain Mobility Models Summary..30 Chapter 5: Simulation and Implementation Simulation Network Simulator NS-2 Basic Architecture NAM Installation and Configuration of NS v

7 5.3 Trace File AWK script BonnMotion Installation of Bonnmotion Scenario Generation Scenario generation of Random Waypoint Scenario generation of Gauss-Markov Scenario generation of Chain Summary Chapter 6: Results and Analysis Simulation Parameters Performance Parameters Simulation Results of AOMDV and DSDV routing protocols with the RWPM Number of nodes vs. Packet Delivery Ratio Number of nodes vs. End-to-End delay Number of nodes vs. Throughput Simulation Results of AOMDV and DSDV routing protocols with the GMM Number of nodes vs. Packet Delivery Ratio Number of nodes vs. End-to-End delay Number of nodes vs. Throughput Simulation Results of AOMDV and DSDV routing protocols with the Chain Mobility Models Number of nodes vs. Packet Delivery Ratio Number of nodes vs. End-to-End delay Number of nodes vs. Throughput Validation Simulation Analysis Random Waypoint model Gauss-Markov model Proposed Chain model Summary vi

8 Chapter 7: Conclusion and Future Work Conclusion Limitations Future Work.. 54 References Publication..60 Plagiarism Report...61 vii

9 List of Figures Figure 1.1 Wireless Network.. 1 Figure 1.2 Types of Wireless Network.. 2 Figure 1.3 Wireless Ad-hoc Network (WANET) Figure 1.4 Mobile Ad hoc Network Figure 1.3 Vehicular Ad hoc Network (VANETs) Figure 1.4 Flying Ad hoc Network....6 Figure 2.1 Flowchart of Routing Protocols Figure 2.2 Mobility Models Figure 2.3 Random Waypoint Mobility Model...15 Figure 2.4 Gauss-Markov Mobility Model Figure 2.5 Semi Random Circular Mobility Model Figure 2.6 Mission Plan Based Mobility Model Figure 3.1 Flowchart of Methodology Figure 4.1 Flowchart of Proposed chain model Figure 5.1 Basic Architecture of Network Simulator Figure 5.2 Network Animator of 70 nodes...33 Figure 5.3 Trace File Format Figure 5.4 Trace file of DSDV. 35 Figure 5.5 Parameters of Trace File read by AWK file Figure 5.6 Random Waypoint Mobility Scenario Figure 5.7 Gauss-Markov Mobility Scenario Figure 5.8 Mobility scenario of Chain model Figure 6.1 Number of nodes vs. PDR for Random Waypoint. 43 Figure 6.2 Number of nodes vs. End-to-End delay for Random Waypoint.44 Figure 6.3 Number of nodes vs. Throughput for Random Waypoint.. 44 Figure 6.4 Number of nodes vs. PDR for Gauss-Markov Model Figure 6.5 Number of nodes vs. End-to-End delay for Gauss-Markov Model 46 viii

10 Figure 6.6 Number of nodes vs. Throughput for Gauss-Markov Model. 47 Figure 6.7 Number of nodes vs. PDR for Chain Model Figure 6.8 Number of nodes vs. End-To-End Delay for Chain Model Figure 6.9 Number of nodes vs. Throughput for Chain Model Figure 6.10 Comparison of delay ix

11 List of Tables Table 1.1 Comparison between MANET, VANET, and FANET.8 Table 6.1 Parameters of Simulation.41 Table 6.2 Number of nodes vs. PDR for Random Waypoint Table 6.3 Number of nodes vs. End-to-End delay for Random Waypoint..43 Table 6.4 Number of nodes vs. Throughput for Random Waypoint 44 Table 6.5 Number of nodes vs. PDR for Gauss-Markov Model..45 Table 6.6 Number of nodes vs. End-to-End delay for Gauss-Markov Model.46 Table 6.7 Number of nodes vs. Throughput for Gauss-Markov Model...46 Table 6.8 Number of nodes vs. PDR for Chain Model 47 Table 6.9 Number of nodes vs. End-to-End delay for Chain Model 48 Table 6.10 Number of nodes vs. Throughput for Chain Model...49 x

12 List of Abbreviations UAV WANET VANET FANET OLSR AODV AOMDV PDR DSDV RPGM DSR RWPM GMM Unmanned Aerial Vehicle Wireless Ad-hoc Network Vehicular Ad-hoc Network Flying Ad-hoc Network Optimized Link State Routing Protocol Ad-hoc On-demand Distance Vector Routing Ad-hoc On-demand Multipath Distance Vector Routing Packet Delivery Ratio Destination Sequenced Distance Vector Routing Protocol Reference Point Group Mobility Model Dynamic Source Routing Random Waypoint Mobility Model Gauss-Markov Mobility Model xi

13 Chapter 1 Introduction This Chapter discusses the brief introduction about the wireless network, different types of wireless network, wireless ad-hoc networks, MANETs, VANETs, and FANETs with its characteristics and the working of AOMDV and DSDV routing protocols are discussed. 1.1 Wireless Network In Wireless networks, two or more devices communicate with each other using radio channels. It avoids the cables which are very costly to build a connection between various devices or computers. In the past, they believed that wireless networks are less secure rather than wired networks and continuously some improvements come in wireless networking standards. Also, the security and speed differences have comes in technologies [1]. Figure 1.1 shows that how the devices access the Wi-Fi connection Benefits of Wireless Networks Figure 1.1 Wireless Network There are various benefits for wireless networks are mentioned below: Easy to move around: In the network connectivity, it is very easy for the hardware to relocate in wireless networks. If the desired location range is out from the wireless network, the range is easily increased by using additional hardware quickly. 1

14 No Messy Wires: The major benefit is not to use lots of cables to connect servers, workstations and some other devices. It reduces the network cost. The maintenance cost of wireless networks is cheaper than the wired networks because there is no need to replace or repair the cables. Provide access to visitors: It can provide free Wi-Fi access to the large number of visitors at cafes, coffee shops, and restaurants. There is no need to worry about the security. Internet access can be offered by bu1sinesses to the visiting clients and enable the more effective meetings with them. Mobile Connectivity: It provides connectivity to the devices in wireless network otherwise some devices in the wired network are unable to connect like smart phones and tablets. Over the wired network, many benefits are offered by a wireless network like scalability and also reduces the maintenance and installation cost [2]. 1.2 Types of Wireless Network Wireless Networks are divided into two categories: Infrastructure Based and Infrastructure-less Based. Wireless Ad-hoc Networks is the type of Infrastructure-less Based Wireless Network. The below Figure 1.2 shows the hierarchy of wireless network: Figure 1.2 Types of Wireless Network Infrastructure Based Wireless Network In this network, there is an access point like a router or a base station. The base stations act as infrastructure which is responsible for communicating the mobile nodes. In Infrastructure mode, there is a need for at least one access point. 2

15 1.2.2 Infrastructure-less Based Wireless Network In Infrastructure-less Wireless Network, there is no need for any infrastructure. All the moving nodes are communicating with each other through a radio signals but not use of any base stations. For example, the mobile-to-mobile communication, vehicleto-vehicle communication, Unmanned Aerial Vehicles communications etc. 1.3 Wireless Ad-hoc Networks In this network, there is no pre-existing infrastructure which is responsible for the communication between the devices. All the moving nodes share the information between each other without any existing infrastructure. WANET are divided into three categories: Wireless Mesh Network, Mobile Ad-hoc Network (MANET) and Wireless Sensor Network are shows in below Figure 1.3. Figure 1.3 Wireless Ad-hoc Networks (WANET) Wireless Mesh Network In this network, all the nodes are arranged in a mesh structure. In this network, a topology of the network is more static because the mobility of nodes is very low. It takes lots of time to update the routes if the nodes are moved very frequently. Mesh network consists of gateways, mesh routers, and mesh clients such as cell phones, laptops etc. Mesh networks are more reliable because all nodes communicate with each other if one of them fails. 3

16 1.3.2 Wireless Sensor Network In this network, to monitor the environmental conditions such as weather, temperature etc, various autonomous wireless sensors are available. On one sensor, there is thousands number of nodes are connected to it. There are various parts of wireless sensor network such as radio transceiver, antennas, microcontroller etc Mobile Ad-hoc Network (MANET) A Mobile Ad-hoc Network (MANETs) is a type of ad-hoc network where each device moves freely in any direction and links are changed very frequently with other devices. Mobile ad-hoc networks where mobile nodes communicate with each other without any infrastructure. The Figure 1.4 shows the communication between the devices. Figure 1.4 Mobile Ad-hoc Network The most challenging issue is routing in MANETs. The existing routing protocols can be categorized into reactive and pro-active protocols in the wireless ad-hoc network. In all environments, most of the known protocols do not perform well [3]. The rapid expansion comes due to widely available wireless devices or inexpensive under the field of MANETs. In MANETs, an autonomous collection of smart phones, sensors, laptops sharing the information between the nodes under wireless links and in the absence of fixed infrastructure, it provides necessary network functionality [4]. MANETs are the super class of VANETs and FANETs. In VANETs, the vehicles communicate with each other and in FANETs, the Unmanned Aerial Vehicles (UAV) 4

17 communicating with each other. The main two types of MANETs are VANETs and FANETs. The characteristics of MANETs are described below: Dynamic topology: In MANET, the nodes move randomly which make network topology dynamic in nature. Distributed operation: In MANET, the network is controlled by all the distributed nodes as there is no one network that control the network operation. Multi hop routing: When a source node sends data to the node out of radio range, then the message is send through other nodes. Autonomous behavior: In MANET, the mobile nodes can behave as a host and in addition a router VANETs VANETs are the type of mobile ad-hoc network they formed a wireless communication between the vehicle-to-vehicle, vehicle-to-infrastructure, and infrastructure-to-infrastructure by using the IEEE standard p. Many people are killed during the accidents. So the safety is most important when we design a routing protocol. Through a wireless connection, all the mobile nodes share the information between each other having some properties like rapid changing topology, variable network density, predictable mobility and high computational ability. V2I share the information between the nodes which act as vehicles and the roadside units (RSUs) to avoid the vehicle collisions. In Vehicle-to-Vehicle (V2V), through a radio communication range two or more vehicles communicate with each other in the adhoc wireless network [5]. Figure 1.5 shows the communication between the vehicles to vehicles, and vehicles to infrastructure, and infrastructure to infrastructure. The various characteristics of VANETs over the MANETs are described below: High mobility: In VANET, the nodes move at high speed in a network as compared to nodes in MANET. Unbounded network size: VANET can be formed for a city, many cities or a country which make VANET geographically unbounded. Communication environment: In VANET, the communication between vehicles is done for both city and highway scenarios. 5

18 Mobility pattern: The nature of mobile nodes is affected by traffic, construction of roads, location and moving speed of vehicle and driving nature of driver. Frequent disconnection: As the topology changes dynamically in VANET, the vehicles are disconnected frequently. Figure 1.5 Vehicular Ad-hoc Network (VANETs) [5] Flying Ad-hoc Networks (FANETs) FANETs are the subtype of MANETs where the Unmanned Aerial Vehicles (UAV) communicates with each other for sharing the information. There are two types of communication in FANETs: UAV-to-Infrastructure and UAV-to-UAV. In the Infrastructure based network or UAV-to-Infrastructure, all the Unmanned Aerial Vehicles are connected to the satellite or a ground base station directly. The below Figure 1.6 shows the communication between the UAVs and also the communication between base station and UAV: Figure 1.6 Flying Ad-hoc Network 6

19 If the UAVs are connected with each other without any need of infrastructure are called as Infrastructure-less Networks or UAV-to-UAV communication. Flying adhoc networks work in three dimensions such as x-axis, y-axis, and z-axis. The topology of flying ad-hoc networks are changing very frequently than the MANETs and the VANETs because the speed is very fast. There are various routing protocols are available to analyze the performance. There are various advantages of having multi-uav system are described as follow: Cost: The cost of small UAV is very less rather than the large UAV and also the cost to maintain the small UAVs is less. Scalability: By using multiple UAVs the scalability of the operation is extended compared to one large UAV. Speed: Using multiple number of UAVs complete the mission fast as compared to single UAV. Survivability: Only one UAV does not proceed to complete the mission if it fails but in case of multiple UAVs, the mission will be extended by the using of other UAVs Applications of FANETs The advantages of FANET like more flexibility, less operating cost makes it useful for various applications described as follow: Disaster monitoring: FANET is used in transferring the data collected from the disaster-affected area to the base station for monitoring. Wind estimation: Unmanned Aerial Vehicles are used to estimate the speed and direction of the wind. Border surveillance: Unmanned Aerial Vehicles are equipped with cameras at border areas for detecting, tracking and recognizing unauthorized intruders. Managing wildfire: Unmanned Aerial Vehicles captures the images of the burned area and forward this information to the base station. Search and Rescue operations: Unmanned Aerial Vehicles has the ability to carry resources for search and rescue operation. 7

20 1.4 Comparison between the MANET, VANET, and FANET: The Table 1.1 shows the comparison of these three wireless ad-hoc networks. Table 1.1Comparison among MANET, VANET, and FANET [6]: Ad-hoc Network Types MANET VANET FANET Parameters Node Mobility Low Compactness Medium Compactness High Compactness Mobility Model Random Regular Regular for predetermined paths Node Density Low Very High Very low Topology Change Slow Fast Fast Radio Propagation Model Close to ground Close to ground High above the ground Power Consumption Energy efficient Protocols Not needed Energy efficiency for mini UAVs, but not needed for small UAVs Computational Power Limited High High Localization GPS GPS, AGPS, DGPS GPS, AGPS, DGPS, IMU 1.5 Routing Protocols Routing protocols defined a route for sending the data packets from the source to the destination. The main aim of routing is to optimize the path where packets delay is very less and more packet delivery ratio. The two routing protocols are describes below: Working of Ad-hoc On-Demand Multipath Distance Vector Routing Protocol (AOMDV) AOMDV is the improvement of AODV routing protocol used to calculate multiple link-disjoint and loop-free paths. AOMDV uses the route construction process of 8

21 basic AODV routing protocol. For each destination node, they hold a routing table having a routing entry includes the list of next hopes with its related number of hopes. Every next hope contains the same sequence number for keeping the track of routes. Advertised hop count maintained by destination node which called as maximum hop count for all the possible routes. The advantage of AOMDV routing protocol is permitted to answer to route request (RREQs) by intermediate nodes during the selection of disjoint paths. The more message overhead comes because of the selection of multiple paths and the destination node has to reply to the multiple route requests (RREQs) [7] Working of Destination Sequenced Distance Vector Routing Protocol (DSDV) DSDV protocol is a Table-Driven Routing protocol. The Bellman-Ford algorithm is used in the DSDV protocol and also it is the modified version of Distance Vector Routing. Each node having a routing table that contains the information of the possible destination nodes and hop count to each destination within the ad-hoc wireless network. Initially, the routing table is empty at each node. Periodically, a node sends its routing table to the neighboring nodes. The node calculates the shortest distance and updates the value in the routing table. The limitation of DSDV protocol are count goes to infinity. All the issues of Distance Vector are solved by DSDV. The two different parameters are added in DSDV <Sequence no, Damping> where Sequence no was added to avoid looping and to avoid unnecessary updates Damping is used. The updates of this routing protocol are performed in two ways: Periodic Updates: After every 15 sec periodic updates are sent. The whole table is broadcast from each node. Trigger Updates: In between the periodic updates, the updates are sent when an update is received by any node [11]. 1.6 Organization of Thesis The rest of the structure of this thesis is: 9

22 Chapter 2 describes the types of routing protocols and the mobility models in FANETs and also discusses the review work on the routing protocols and mobility models. Chapter 3 divided into four sections. In the first section, the research gaps are explained. In the second section, the problem statement is defined. Third section presents the objectives of this research and the last section briefs in present work. Chapter 4 discuss about the proposed model. Chapter 5 discuss about the implementation work of thesis and discuss about the NS-2 simulator, installation steps of NS-2, trace file, and AWK file and brief introduction about the Bonnmotion tool and also describe how to generate a mobility model scenario helps us to create a test bed for the proposed model. Chapter 6 shows the results of one reactive protocol AOMDV and one proactive protocol DSDV under the different mobility models and the proposed chain model. The routing protocols performance is measured under the two different mobility models and one proposed chain model. Chapter 7 discuss the conclusion of the proposed chain mobility model and also discuss the limitations of research. The future scope of the proposed model was also discussed. 1.7 Summary This chapter gave the overview of the wireless ad-hoc network and the types of adhoc networks and also discussed about the mobile ad-hoc network, vehicular ad-hoc networks, and flying ad-hoc network with its characteristics. The comparison of MANETs, VANETs, and FANETs are shown in table for clearly differentiate between the three wireless ad-hoc networks. The working of AOMDV and DSDV protocols are also explained. The organization of the thesis gave the overall structure of the thesis. 10

23 Chapter 2 Literature Survey This chapter describes the types of routing protocols and the mobility models in FANETs and also discusses the review work on the routing protocols and mobility models. 2.1 Routing Protocols in FANETs The mechanism is to establish and select a specific path for data sending from source to destination, there is a need for various protocols of routing. So the various protocols are available for the wireless ad-hoc network. The classification of routing protocols is divided into five categories i.e. Topology based, Position based, Cluster based, Geo-cast based, Broad-cast based protocols. The hierarchy of routing protocols shown below in Figure 2.1: Figure 2.1 Flowchart of Routing Protocols Topology-Based In this routing, the links data is used to sending the data from one node to another node within a network. Data packets are forwarded by using the information of the links. The two types of topology-based routing protocols are Reactive based and Proactive based routing protocols. 11

24 Reactive Based Routing Reactive based routing is the On-Demand routing protocols. In reactive routing, when the node wants to share the data with another node all the routes are open. This routing protocol maintains only those paths which are presently used. The results of reactive routing, the burden of the network is reduced. Reactive routing protocols having a route discovery phase where they flooded the query packets into the network for searching the path and when the route is found, this phase was completed [9]. The examples of reactive protocols are AODV, AOMDV, DSR, and TORA Proactive Based Routing Proactive based routing protocols are the Table-Driven based routing protocols. In the proactive, the information at every node has maintained in the table and also the table share with another node for sending the information from one point to the other point. The information in the table is consistent and up-to-date on the routing is stored at every point. The different types of proactive routing protocols are DSDV, OLSR, and FSR Position Based Routing The data for vehicles is the position which is very important for vehicles. All the vehicles want to know its neighbor vehicle s position as well as its own vehicle position. The position of vehicles may be gathered from the GPS (Geographical Position System). The routing protocol which uses the information of position called as a position-based routing protocol. The position of the vehicles can be obtained when the vehicles transmitted beacons or control messages directly to the neighbors. Through a location service, the sender can request for the position of the receiver. When the route is traced there is no overhead comes because the protocols are not used the routing tables. The route is composed of the source to the destination vehicle by the communication links between the several pairs of vehicles are connected with each other. We find the position of the vehicle in the future by predicting links between the two vehicles if we know the position of the current vehicle [10]. There position based protocol like GPSR etc. 12

25 2.1.3 Geo Cast Based This routing protocol called as geographic based protocols. The main purpose when one vehicle share the data to the other vehicle within a geographic region i.e. ZOR. The nodes called as vehicles which do not come under the geographical region, the information is not provided to that node by the geo-cast routing protocols. A forwarding zone which was defined by a geo-cast routing protocol is to overcome the overhead of messages and congestion in the network which is simply created by the flooding of packets everywhere. The different routing protocols are Inter-Vehicle Geo-Cast Routing (IVG), Robust Vehicular Routing (ROVER). The disadvantage of geo-cast based routing is contention, high latency period, and collision problems. The advantage of the geo-cast routing is to reduce the overhead problem of data packets during the transmission Broadcast-Based Routing Broadcast routing protocols called as flooded based routing protocols for sharing information between the vehicles. When the event or accident occurs, they transmit the data to the possible maximum number of nodes. The reason to use the broadcast based protocols for analyze the weather conditions, information about the traffic on the roads, road conditions, emergency conditions, announcements, and delivering advertisements. Almost in all the safety applications, broadcast-based protocols play a big role. Within the range, the data is broadcast to all the mobile nodes with the use of multi-hop transmission. For the broadcast applications, the conventional protocols like DSR and AODV are not appropriate for VANETs. The disadvantages of the broadcast routing protocols are the big chances of collision of transmitted messages and hidden node problem. The broadcast routing protocols are Distributed Vehicular Broadcast Protocol (DV-CAST), BROADCOMM Cluster Based Routing Cluster based routing protocols create clusters between the vehicles. The group of vehicles which are having a same intension called as cluster. In the cluster, there is a one cluster head which is responsible for giving the information to all the nodes within the cluster. The head of the cluster is responsible for the communication of inter and intra-clusters. There is a direct link between the vehicles to communicate 13

26 within a cluster and for the communication between the inter cluster, that is possible through a designated cluster heads. The data packets are broadcast to all the vehicles within the cluster by a cluster-head. The result of cluster-based routing protocols is, it improves the scalability when the no of nodes is very large. The different clusterbased protocols are CBDRP, CBLR. K. Singh and A. K. Verma [11] experimented on the performance of AODV, DSDV, and OLSR protocols for the different parameters named as PDR, Throughput, and E- To-E delay at the different speeds of the node in flying ad-hoc networks. The results show that OLSR protocol performed better in all the parameters than the AODV and DSDV. M. A. Mahdi and T. Wan [12] discussed the performance of single-path and multipath routing protocols CBRP, AODV, and AOMDV for the sparse and dense network. The authors analyzed that the AOMDV performed better in terms of delay rather than the CBRP and AODV for both dense and sparse networks but in PDR, AODV performed better than the CBRP and AOMDV in sparse topology. T. K. Araghi et al. [13] experimented on the performance of reactive based protocols in terms of PDR, E-To-E Delay, and throughput. The authors observed that if the total number of nodes is 20 in the network, then PDR and Throughput of DSR and AOMDV performed better rather than the AODV and the E-To-E delay is also very less in AOMDV than the AODV and DSR. S. K. Nalam et al. [14] experimented on the behavior of three protocols AOMDV, DSR, and OLSR using UDP agents. Authors determined the routing protocol which performed better in PDR, E-To-E Delay, Throughput, packet loss, and energy consumption. According to the results, OLSR shows better results in all the parameters. AOMDV shows better results in PDR and Throughput rather than DSR. 2.2 Mobility models in FANETs Mobility Models represents the scenario of nodes mobility and provides the information about the velocity, acceleration, and location that can change according to time. Mobility models generate a simulation environment in realistic. There are various mobility models available for the wireless network. With the help of mobility models, we can analyze the routing protocols performance. They also compared the 14

27 different well-known ad-hoc routing protocols under the Mobility Models. The four different types of Mobility Models which mainly exist in FANETs are shown below in Figure 2.2 [15]: Figure 2.2 Mobility Models Random Waypoint Mobility Model In Random Waypoint, every node selects the destination point randomly and moving toward it with random velocity chosen from the range of [0-Vmax] shown in below Figure 2.3. Figure 2.3 Random Waypoint model [31] If goal achieved, for some interval of time node stops and that interval is defined by the parameter named as pause time. After this interval of time, the node chooses the destination point randomly again. The entire procedure repeats again till the whole simulation time gets over [16]. 15

28 K. Singh and A. K. Verma [17] discussed the effect of different mobility models on the OLSR routing protocol performance in FANETs. The Mobility Models like Pursue, Random Waypoint Mobility Model, RPGM, and Manhattan Grid Mobility Model are used for the analysis. Authors analyzed the performance on different parameters named as PDR, Average Throughput, and E-To-E delay at the different nodes speed. The authors conclude that performance is varied according to the mobility models and the speed of node. OLSR performed better results under the Pursue as compared to the Random Waypoint, RPGM, and Manhattan Grid Mobility Model for FANETs. B. Singh et al. [18] analyzed the MANETs AOMDV routing protocol performance under different mobility models such as Random Waypoint, RPGM, Column, Manhattan, Pursue, and Nomadic in terms of PDR, E-To-E delay, and Throughput. The results of AOMDV compared with the AODV routing protocol. The authors proved that AOMDV protocol performed better under all the mobility models rather than the AODV routing protocol. B. Divecha et al. [19] compared the effect of different mobility models on one reactive DSR and one proactive DSDV routing protocols performance in flying adhoc networks. Authors used four different mobility models such as Freeway, Random Waypoint, Manhattan, and Group Mobility Model. The authors analyzed that the performance of protocols varies according to node density, Mobility Models, and data paths length. The results show that DSR performed better when the mobility of nodes is very high rather than DSDV. The new route was discovered faster when the old route was broken in DSR but in DSDV, a mechanism for route repair is not available. P. Sharma and I. Yadav [20] proposed an improved RGR routing protocol which is geographical routing protocol and analyzed the impact on existing RGR protocol in flying ad-hoc network. After the authors analyzed the performance of improved RGR protocol under Random Waypoint for different QoS parameter values such as PDR, Throughput, and E-To-E delay. The results proved that the new enhancements in the RGR protocol gave less overhead and higher PDR rather than the original AODV and the RGR protocol. A. Aggarwal et al. [21] discussed the three protocols AODV, DSR, and DSDV performance in MANETs for Random Waypoint. The performance analysis 16

29 parameters are the average delay, Throughput, PDF, and NRL. The authors analyzed the performance under three different densities of nodes such as low, medium, and high. The results proved that AODV performs better rather than the DSR and DSDV. G. Jayakumar and G. Ganapathi [22] analyzed the two reactive routing protocols DSR and AODV performance under the two mobility models Random Waypoint and RPGM Model. The performance was analyzed for different QoS parameters such as PDR, NRL, Normalized MAC load, Average Delay by varying the different node densities, network loading and the variations in mobility for the two different mobility models. Authors observed that the high throughput and least overhead comes in AODV and DSR when compared with RPGP Mobility Model. M. Amnai et al. [23] discussed the impact of different densities of nodes and mobility models on different QoS parameters such as PDR, Delay, and Throughput. Authors compared the performance of OLSR protocol on two different scenarios one is realtime VBR and another is CBR Traffic. Random Waypoint, Mobgen steady state, and Random Direction Mobility models are considered for the evaluation of OLSR protocol. The results proved that according to change of the traffic and the mobility model, performance of OLSR routing protocol changes. D. Singh et al. [24] discussed the performance of four well-known MANET routing protocols such as LANMAR, DYMO, LAR1, and ZRP under the Random Waypoint Mobility Model. The metrics named as average jitter, PDR, average E-To-E delay, and throughput used for the analysis. The authors proved that LANMAR performed better in average E-To-E delay and average jitter but in PDR and throughput LAR1 gave better results. DYMO and ZRP both show worst results in average jitter and PDR respectively Gauss-Markov Mobility Model Gauss-Markov Model is used to simulate the behavior of Unmanned Aerial Vehicle and the simulated area size is variable. In this model, every node is pre-defined by direction and speed. At fixed interval of time, movement occurs by updating the direction and speed of every node. The value of direction and speed at the nth point of time is calculated by the value of direction and speed of the previous point i.e. n-1th. 17

30 The below Figure 2.4 shows the movement of the node according to the previous node position [15]: Figure 2.4 Gauss-Markov Mobility Model [15] M. Alenazi and C. Sahin [25] proposed some enhancements in the existing ns-3 implementation of 3-D Gauss-Markov Model. The authors followed the approach that all the mobile nodes are moving at the center of the simulation area with some random angle. The new implementation proved that the nodes which are mobile are moving smoothly within the simulation boundaries area and there is no bounce off. A. Jain et al. [26] discussed the TAODV routing protocol which is trust based protocol. TAODV protocol used to modify the black hole attacks in the MANETs. The performance is analyzed under the Gauss-Markov Model for three different traffic scenarios such as Pareto, Exponential, and CBR. The authors analyzed that for the PDR and Throughput Gauss-Markov and Random Waypoint Model gives better results. B. S. Gouda et al. [27] proposed a new reactive protocol ORSRP which gives an optimal route for sending the data packets to the destination and gives lower overhead in communication. It is based on the route discovery approach. ORSRP is based on the reactive routing which calculates an RREQ, RREP, RCAC, and RRER in reverse route for find the best optimal path. The authors show that the proposed protocol performed better results rather than the existing routing protocols in MANETs in terms of Packet loss, packet delivery percentage, routing packet overhead, Throughput, and average E-to-E delay under the Gauss-Markov Mobility Model. 18

31 D. Chenghao [28] proposed enhancements in the existing reactive protocol DSR for the improvements of the link between nodes. The authors proposed a Gauss-Markov to reduce the random movements of the nodes. The improved protocol may increase the number of hops rather than the original DSR protocol having minimum no of hopes in data transmission which makes a more stable network. The authors analyzed that the improved DSR routing protocol gives better results rather than the original DSR protocols in PDR, received throughput, average E-To-E delay, and average jitter. S. LAQTIB et al. [29] evaluated the different mobility models effect on the OLSR routing protocol performance. The different mobility models named as Random Waypoint, Random Walk, Random Direction, and Gauss-Markov Mobility Models are used for analysis. The results show that Random Waypoint performed well in the parameters of QoS like PDR, E-To-E delay, and Throughput when the number of nodes varies. A. Macintosh et al. [30] discussed the effect of speed on the performance of position based protocol under the mobility model. The OPNET simulator is used for simulation. The authors proposed a different protocol in the Internet Engineering Task Force (IETF). The proposed protocols are evaluated under the various mobility models. The position based protocols GPSR, GRP, and LANDY are analyzed in terms of PDR, Routing Overhead, and throughput at the different speed of nodes. In another case, authors compared the four mobility models named as Random Waypoint, Gauss-Markov, Manhattan, and RPGM at the different node speeds. The authors show that the performance of protocols varies according to the mobility models. Dr. K. Sumathi et al. [31] analyzed the performance of QSEAAR protocol under the various mobility models in MANETs. Authors conclude that only Random Waypoint model is not sufficient for the analysis of QSEAAR protocol. The Random Waypoint, Manhattan Grid, RPGM, and Gauss-Markov Mobility Model used to analyze the performance of QOS based stable energy aware ad-hoc routing protocol (QSEAAR) in terms of PDF and average delay. The authors conclude that protocols performance varies according to different mobility model. A. M. Qureshi and B. M. Khan [32] analyzed the routing performance of protocols for the different mobility models. Authors got the overall network throughput by varying 19

32 the speed of nodes. The authors gave a better routing protocol on the basis of throughput of different routing protocols. The simulation can be done in ns-3 simulator which is more suitable to optimize the parameter values without any overhead. The authors conclude that AODV performed much better than the OLSR and DSDV routing protocol. OLSR performed better in Random Waypoint Mobility Model and the Gauss-Markov Mobility Model when node speed is very less. S. Singla and S. Jain [33] compared the performance of AODV, OLSR, and DSDV protocols under the Gauss-Markov Mobility Models in real world scenarios. The authors conclude that OLSR performed well in PDR rather than the AODV. OLSR also performed better in average delay and throughput rather than DSDV Semi-Random Circular Movement Model Semi-Random Circular Mobility Model is applicable for gathering some information by turning around a specific position for simulating UAV s and this model is designed for the curved movement scenarios. In this model, the route is hexagon rather than Random Waypoint Mobility Model where the plan of flight is not predetermined. In this model, aircraft are placed at different locations wherein a square area it selects the desired object as shown in the below Figure 2.5 [15]: Figure 2.5 Semi-Random Circular Mobility Model [15] Mission Plan Based Model In Mission Plan Based Model, the whole information of trajectory already knows by the aircraft which are planned in advance. This means that on the predefined path all the aircraft travel along with them consistently. This MPB Model creates a mobility files which is updated after some period of time. In mission plan based model, the starting and the ending points are selected randomly for each aircraft and they move 20

33 towards or away from the destination. The flight time and the velocity of flight are given. Each aircraft changes its direction to the starting point when they reach the destination point before when flight time is over. Below Figure 2.6 shows that the aircraft reaches the mission area and the information of location is available [15]. Figure 2.6 Mission Plan Based Mobility Model [15] 2.3 Chain Model Chain model is basically a concatenation of various mobility models (Random Waypoint, Reference Point Group Mobility model, Manhattan Grid, Gauss-Markov). In this model, the position of the first node in the n-1 th scenario is connected with the first position of n th scenario. Chain model is used to model a real scenario. The chain model is used by various research fellows as discussed below: A. Bhasin and D. Kumar [34] compared the performance of DSR and AODV reactive routing protocols using chain mobility model. The simulation is done with NS-2 simulator using throughput, packet delivery ratio and end-to-end delay performance parameters. AODV and DSR give equal throughput using chaintest random and chain campus model. In chaintest random model, DSR protocol results in more end to end delay as compared to AODV. AODV give steady packet delivery ratio using chain campus model and packet delivery ratio of DSR is reduced with varying number of nodes. A. K. Shukla and C.K.Jha [35] compared chain mobility model (Random Waypoint and Manhattan Grid) with Random Waypoint model. The different performance parameters like throughput, end to end delay and packet delivery ratio are evaluated for DSR routing protocol. The simulation is done using NS-2 simulator for varying 21

34 number of nodes. The results show that chain model gives better performance compared to Random Waypoint mobility model. Y. Huan et al. [36] compared the performance of Random Waypoint, Reference point group mobility model, Manhattan and Freeway mobility models in a sparse network. From the results, it is concluded that these four mobility models are not relevant for sparse ad hoc network. The authors proposed a chain mobility model for efficient communication between nodes in sparse Ad hoc network. The simulation results show that chain model gives better performance for the sparse network. 2.4 Summary This chapter properly discussed the different types of routing protocols and also gave a quick summary on the working of routing protocols. The different mobility models of FANETs are also discussed. The review work concludes that the protocol OLSR performed better in all the parameters of quality of service. The authors also concluded that AOMDV performed better in PDR and throughput rather than the AODV when the different protocols are compared. The performance of protocols also analyzed under the different mobility models individually. The authors also analyzed the performance of protocols on the chain mobility models. 22

35 Chapter 3 Problem Statement and Objective This chapter is divided into four sections. In the first section, the research gaps are explained. In the second section, the problem statement is defined. Third section presents the objectives of this research and the last section briefs in present work. 3.1 Research Gaps The list of research gaps which are identified during the survey of the FANETs are: i. In wireless ad-hoc networks, the chain mobility model is mainly formed by integrating Random waypoint model and Manhattan Grid mobility model [34, 35]. The other existing mobility models are not considered for integration for the said purpose. ii. In FANETs, the QoS performance parameters are mostly evaluated by using Random waypoint model [19, 21] and Gauss-Markov mobility model [23, 24] for routing protocols. In FANETs, the chain mobility model is not used for evaluating parameters. 3.2 Problem Statement The different challenges have been identified and addressed in flying ad-hoc networks. The major problem in FANETs is routing. The appropriate routing is achieved only when the routing protocols satisfy the quality of service parameters. Only the routing is not important but the mobility pattern of nodes in FANETs are also important as the mobility models enhance the performance of routing protocols. The performance of AOMDV (reactive based) and DSDV (proactive based) protocols under the different mobility models and the proposed chain model to be evaluated for FANETs. 3.3 Objective The objectives of this thesis are discussed below: 23

36 1. To study the flying ad-hoc networks and the different routing protocols for wireless ad-hoc network. 2. To study the existing mobility models for FANETs. 3. To simulate selected routing protocol under the different mobility models and proposed chain mobility model for FANETs. 4. To compare and validate proposed model for performance of QoS parameters PDR, End-To-End Delay, and throughput with the existing selected mobility models performance. 3.4 Methodology The purpose of this research is to improve and compare the performance of routing protocols in terms of different quality of service parameters at different no of nodes under the different models of mobility. The goal is achieved by using the proposed mobility model which is explained in the next chapter. The methodology of this research work is shown below in Figure 3.1 and the steps are explained here: 1. Firstly, simulation environment has been set up for AOMDV and DSDV protocols in NS-2 using TCL script. 2. The mobility scenarios of Random Waypoint model, Gauss Markov model and are generated in Bonnmotion tool. 3. In the proposed work, create a chain of RWPM and GMM. In FANET, at starting the movement of UAVs will be modeled according to Random Waypoint model and when the UAVs are near their destination, the movement is modeled by Gauss-Markov model. 4. The mobility scenario files are simulated on the NS-2 simulator. This network simulator generates trace file and the network animator (NAM) file. Then creates AWK script to read the trace files and get the values of quality of service parameter such as packet delivery ratio, end-to-end delay, and throughput. 5. To view the topology of the network, network animator (NAM) file is used. 6. Then creates a graph of obtained values to analyze the performance of AOMDV and DSDV protocols. 24

37 Start Setup simulation environment of AOMDV and DSDV protocols using TCL script in NS-2 simulator Generate a scenario of Mobility Models using Bonnmotion Generated Mobility scenarios are simulate on NS-2 simulator Trace files and NAM files are generated by NS-2 Create AWK scripts to read the trace files Get the values from trace file Results are obtained for QoS parameter PDR, delay, and throughput Compare the AOMDV and DSDV protocols using graphs To view the network topology NAM is used Stop Figure 3.1 Flowchart of Methodology 25

38 3.5 Summary This chapter concludes the different major routing problems which are faced in the FANETs. The major concern in the routing protocols is to satisfying the parameters of quality of service for the improvement of performance. The mobility model improves the performance of routing protocols. The chain of Random Waypoint and Gauss- Markov mobility models are proposed in this thesis and we analyzed the AOMDV and DSDV protocols under the proposed model and compare with existing mobility models performance. 26

39 Chapter 4 Proposed Model This chapter discuss about the components of proposed chain model, Random Waypoint model, Gauss-Markov model with their algorithms. 4.1 Components of Proposed Chain mobility model The chain mobility model is the combination of RWPM and GMM is proposed in this thesis work. In FANET, at starting the movement of UAVs will be modeled according to RWPM and when the UAVs are near their destination, the movement is modeled by Gauss-Markov model. In the review work, the RWPM [17, 18] and GMM [25, 26] are mainly used in the existing research. The algorithms of Random Waypoint and Gauss-Markov are explained below: Random Waypoint Model In Random Waypoint, every node selects the destination point randomly and moving toward it with random velocity chosen from the range of [0-Vmax]. When the goal is achieved, for some interval of time node stops and that interval is defined by the parameter named as pause time. After this interval of time, the node chooses the destination point randomly again. The entire procedure repeats again till the whole simulation time gets over. The algorithm of Random Waypoint model [39] is explained below: Algorithm for Random Waypoint Model Step 1: Define the parameters i denoting the movement duration of node and j which identifies the particular node. (j) Step 2: The random waypoint for each node is represented as vector P i Step 3: The movement trace of a node in Random waypoint model is as given below: {P (j) i } iεn0 = P (j) 0, P (j) 1, P (j) 2, P (j) 3, [39] (4.1) 27

40 Step 4: If the node chooses random speed V i from P i 1 to P i and choose pause time T p,i at P i. The complete movement of node is as given below: {(P i, V i, T p,i )} iε N = (P 1, V 1, T p,1 ), (P 2, V 2, T p,2 ), (P 3, V 3, T p,3 ),. [39] (4.2) Gauss-Markov Model In this model, every node is pre-defined by direction and speed. At fixed interval of time, movement occurs by updating the direction and speed of every node. The value of direction and speed at the nth point of time is calculated by the value of direction and speed of the previous point i.e. n-1th. The algorithm of Gauss-Markov model [26] is explained below. Algorithm for Gauss-Markov Model Assumptions: // all the nodes are located at the random locations // S n is node new speed and D n is node new direction at time of interval (t). //S is mean speed and D is mean direction. // α is the degree of randomness lies between (0 < α <1). α = 0 is for linear motions and α=1 for random values. //S xt 1 and D xt 1 are the random Gaussian distribution with mean=0 and standard deviation is 1. Step 1: Assign a current speed and current direction for the movement to the each node. Step 2: At the constant interval of time, the speed and direction is to update for the movement of nodes. Step 3: The direction and speed are calculated from the previous direction and speed for a period of time (t): S t = αs t 1 + (1 α)s + (1 α 2 )S xt 1 [26] (4.3) D n = αd t 1 + (1 α)d + (1 α 2 )D xt 1 [26] (4.4) Step 4: The next location is calculated from the current speed and direction at each interval of time (t): 28

41 X t = X t 1 + S t 1 cos D t 1 [26] (4.5) Y t = Y t 1 + S t 1 sin D t 1 [26] (4.6) Where (X t,y t ) and (X t 1, Y t 1 ) are the coordinates of node position of X and Y respectively at time interval t and (t-1). S t 1 and D t 1 are speed and direction of node. 4.2 Proposed Chain Mobility Models The chain model is formed by connecting final position of n-1 th scenario with first position of n th scenario. The proposed chain model is formed by combining the RWPM and GMM in a chain. The algorithm of proposed model is explained below: Algorithm for Proposed Chain Model Assumptions: // where n1 and n2 is number of nodes for Random Waypoint and Gauss-Markov respectively. // d1 and d2 is the simulation duration for Random Waypoint and Gauss-Markov respectively. // x, y, and z are the coordinates. Step 1: Create a scenario of Random Waypoint model by initializing values to the n1, x, y, z, and d1. Step 2: Create a scenario of Gauss-Markov model by initializing values to the n2, x, y, z, and d2. Step 3: If n1= = n2 Chain scenario generated Else Chain scenario fails Step 4: Exit The proposed algorithm of chain mobility model is represented with the help of Flow Chart as shown below in Figure 4.1: 29

42 Start Assign a value to the n 1, x, y, and z coordinates, and duration Assign a value to the n 2, x, y, and z coordinates, and duration Yes If n 1= = n 2 No Chain Scenario generated Chain Scenario Fails Stop Figure 4.1 Flowchart of Proposed Chain Model In the proposed model, if n1 is equal to n2, it generate a chain of both the models having duration is equal to the sum of both the durations and the nodes is equal to n1 or n2 otherwise chain scenario generation fails. 4.3 Summary In this chapter, the RWPM and GMM explained in brief with the help of algorithms. The chain mobility model is the combination of RWPM and GMM is proposed in this chapter and explained with algorithm and flowchart. 30

43 Chapter 5 Simulation and Implementation This chapter discussed about the implementation work of thesis and discuss about the NS-2 simulator, installation steps of NS-2, trace file, and AWK file and brief introduction about the Bonnmotion tool and also describe how to generate a mobility model scenario helps us to create a test bed for the proposed model. 5.1 Simulation The generation of FANETs is very costly. So to evaluate the routing protocols performance, different network simulators are used. Simulation is the first step of the implementation of different routing protocols. There are various network simulators which provide a platform for testing and evaluating the performance of routing protocols like OPNET, NS-2, NS-3, Qualnet etc. In FANETs, the mobility scenario generator tool such as Bonnmotion is used to generate the mobility scenarios of unmanned aerial vehicles. The most important parameter for simulating the ad-hoc network is node mobility because, in FANETs, the mobility of the nodes is very higher than the VANETs and the MANETs. The brief introduction of the simulators which has been used in thesis work has shown below: 5.2 NS-2 simulator NS-2 widely called as network simulator version 2. NS-2 uses the two languages, one is coded in C++, and the second one is coded in Object-oriented Tool Command Language (OTCL). For the networking research, NS-2 is a discrete event simulator. NS-2 simulates the list of protocols like UDP, TCP, HTTP, DSR, and FTP. It simulates the both wireless and the wired network. NS-2 uses the TCL script language for creating the different number of nodes [37] NS-2 Basic Architecture 31

44 NS-2 having two key languages: one is C++ and another one is OTCL. ns-allinone is the main directory of network simulator version 2 and it also has a various subdirectories or features which are used to run the Tcl scripts. The back-end of the network simulator is C++ and all the routing protocols are coded in this language and also the main scripting was written in Tcl language for the environment. Both the languages are linked with each other using a TCLCL. The whole working of network simulator is shown below in the Figure 5.1. Firstly, the script is written in OTCL language with the extension of (.tcl). In the terminal, run the.tcl file by using the command (ns filename.tcl) which generates two files: a trace file having an extension with.tr and network animator file having an extension with.nam. We read the trace file for extracting the QoS parameters values such as Packet Delivery Ratio, Generated Packets, Received Packets, Throughput, End-To-End Delay etc by the AWK files, Perl Files etc. Then we plot a graph for clearly identifying the performance of routing protocols. Figure 5.1 Basic Architecture of Network Simulator [38] NAM NAM basically stands for Network Animator which is used for viewing the network in real and analyzing that how the data packets move to the destination from the source node. NAM is a Tcl script based animator tool. It also shows that how packets are dropped during sending. Network animator visualization has shown below in the Figure

45 Figure 5.2 Network Animator of 70 nodes Installation and Configuration of NS-2 NS-2 is an open source simulator. The package of ns-2 downloaded from [10]. NS-2 runs on various different platforms such as LINUX, Windows etc. To run the network simulator on Windows, there is a need to install a package called as Cygwin and the package ns-allinone is needed to run the network simulator on LINUX. There are various different versions of ns-allinone are available. It is the collection of all the packages which are needed to run the network simulator. There are few steps to install ns-2 on LINUX: Step 1: Download the package: ns-allinone-2.35.tar.gz. Step 2: Unzip that package and place it on a home directory in LINUX. Step 3: Open the terminal and type a command sudo apt-get update and then sudo apt-get install build-essential autoconf automake libxmu-dev. Step 4: Go to the home directory where the package is placed by typing a command on terminal: cd ns-allinone Step 5: Type a command:./install. Step 6: Install the network animator by using a command: sudo apt-get install nam. Step 7: The environment variables set by: gedit./bashrc. Step 8: Then type ns on terminal, % shows a successful installation of ns-2. Configuration of NS-2 After the successful installation of ns-2 in LINUX, this platform is used to run the Tcl files. The command ns filename.tcl is used to run the Tcl file by typing a command 33

46 on terminal. To run the nam file nam filename.nam command is used to run the network animator. After running the Tcl file on NS-2 simulator, it creates a trace file with the file extension.tr. Then to read the trace file for getting the useful information like PDR, throughput, End-To-End Delay, we need AWK file scripts. Results are obtained from the AWK file scripts and stored into the table and create a graph of obtained results. The graphs may be created in Microsoft Excel, Matlab etc. 5.3 Trace File The file which contains the information of the overall network called as a trace file. Trace file can be generated by running the TCL script. There are 12 fields in the trace file format [40]. The format of trace file has shown below in Figure 5.3: Event Time From node To node Pkt type Pkt size Flags Fid Src Addr Dst addr Seq Num Pkt id Figure 5.3 Trace File Format The brief description of trace file format can be explained below: 1. Event: It contains a list of different events such as + for packet enque, - for deque the packet, s indicates the source event, r indicates the receiver event, d for dropped packets, c indicates for the collision of packets. 2. Time: The time when the simulation starts. 3. From node: It is the starting node which sends the data packets. 4. To node: It is the ending node where they received the data packets. 5. Pkt type: It defines the type of packet. It may be a cbr or tcp. 6. Pkt size: It defines the size of the packet which is created by the sender. 7. Flags: It defines the flag according to the event. 8. Fid: It is the flag id. 9. Src addr: It is the source address where the packet is created. 10. Dst addr: It is the destination address where the source delivered the data packets. 11. Seq Num: It is the sequence number which is given to the data packets. 12. Pkt id: At the source node, it gives a unique id to each packet when they transmit to another node. 34

47 An example of Trace File Format of DSDV protocol shown below in Figure 5.4: Figure 5.4 Trace File of DSDV 5.4 AWK File AWK files are the scripting files which are used to read the trace files for extracting the useful information such as PDR, Delay, Throughput, Generated and Received Packets, Dropped Packets etc are shown below in Figure 5.5. It reads the trace file in column wise and processing it. The description of a particular column has been described below: $1 represents the ACTION $2 represents Time $3 represents Node Id $4 represents Layer $5 represents Flag $6 represents Sequence No $7 represents Type $8 represents Size $14 represents Energy (for Energy Model) The command to read the AWK files by: 35

48 gawk f filename.awk filename.tr Figure 5.5 Parameters of trace file read by AWK file 5.5 BonnMotion BonnMotion is a scenario generator tool. It is Java based software. It generates scenarios of different mobility models. That generated scenarios are simulated on different provided network simulators. The different network simulators are ns-2, ns- 3, Qualnet etc. There are various mobility models which are easily created in BonnMotion. The list of mobility models are shown below [41]: The Random Waypoint The Gauss-Markov The Manhattan Grid The Random Walk The Random Street l The Reference Point Group The Disaster Area and more Installation of BonnMotion BonnMotion is an open source simulator which generates scenarios of mobility model. There are various mobility models generated by Bonnmotion. There are very few steps to install the software into the ns-2 simulator. Steps are listed below [42]: Step 1: Download the package of BonnMotion tool. 36

49 Step 2: Unzip the package and place into the home directory in the LINUX. Step 3: Install the JRE and JDK by using a command sudo apt-get install openjdk- 7-jre openjdk-7-jdk. Step 4: Go to the home directory where package placed by cd bonnmotion-2.0. Step 5: Then type./install. It successfully installed a bonnmotion tool in ns-2. In a bonnmotion tool, we generate a various mobility models scenarios Scenario Generation In the scenario generation, there is a list of different parameters which are used to generate a mobility scenario of nodes. The list of the parameters that used with all the models shown below: [-n] represents the number of nodes [-d] represents duration of scenario (in seconds) [-x] represents the width of simulation area (in meters) [-y] represents the height of simulation area (in meters) [-z] represents the depth of simulation area (in meters) Scenario generation of Random Waypoint The below command is used to generate a mobility scenario of RWPM:./bm f file1 RandomWaypoint n 10 -x 500 y 500 z 500 d 200 This above command creates a scenario of the file named as file1 with 10 nodes in x, y, z-axis. The whole mobility scenario is stored in two files: one file having a suffix is file1.params which contains parameters values and the second file having a suffix is file1.movements which contains the mobility generated by 10 nodes shown below in the Figure

50 Figure 5.6 Random Waypoint Mobility Model Scenario The command used to convert the scenario files into the NS files by:./bm NSFile f scenario_random Scenario generation of Gauss-Markov The below command used to generate a scenario of Gauss-Markov Mobility Model:./bm f file2_gauss GaussMarkov n 10 -x 500 y 500 z 500 d 200 This command creates a file2_gauss scenario with 10 nodes in x, y, and z-axis. The whole mobility scenario is stored in two files: one file having a suffix is file2_gauss.params which contains parameter values and the second file having a suffix is file2.movements which contains the mobility generated by 10 nodes shown below in Figure 5.7. Figure 5.7 Gauss-Markov Mobility Model Scenario 38

51 Scenario generation of Chain The below command creates a Chain scenario of combined Random Waypoint and Gauss-Markov Mobility Model:./bm f file3 ChainScenario m 1 p RandomWaypoint d 200 n 10 x 500 y 500 z 500 d 200 o 3 GuassMarkov d 200 n 10 x 500 y 500 z 500 d 200. This command creates a file3 scenario with 10 nodes in x, y, and z-axis. The whole mobility scenario is stored in two files: one file having a suffix is file3-all.params which contains all the parameters values of both the models and the second file having a suffix is file3-all.movements which contains the mobility of both the models generated by 10 nodes shown below in Figure 5.8. Figure 5.8 Mobility Scenario of Chain Model 5.6 Summary This chapter discussed about the NS-2 simulator tool, the basic architecture, Installation steps of NS-2. This chapter also discussed about the different mobility models in FANETs. The Bonnmotion tool is used to generate mobility scenarios of models. The Random Waypoint, Gauss-Markov, and Chain mobility model scenarios are generated in this work. The generated scenario is saved in two file: one file having a suffix is filename_params which contains the values of parameters and the second file having a suffix is filename_movements which contains the mobility of nodes. Then convert the scenario files into the TCL files for running onto the NS-2 39

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

Analysis of Routing Protocols over VANET

Analysis of Routing Protocols over VANET Analysis of Routing Protocols over VANET Ramadhan Mstafa 1, Abdalraouf Alarabe, Eman AbdelFattah Ammar Odeh, Muneer Alshowkan Abstract Vehicular Ad-hoc Network (VANET) is a new network technology where

More information

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 9, Sep 2015, pp. 32-41, Article ID: IJCET_06_09_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=9

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE Puneet Mittal 1, Paramjeet Singh 2 and Shaveta Rani 3 1 Dept. of Computer Engg. Govt. Poly. College,

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes Chetana K. Kamate, Dr. Santosh L. Deshpande Department P.G. Studies in Computer Network and Engineering,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

QoS Based Evaluation of Multipath Routing Protocols in Manets

QoS Based Evaluation of Multipath Routing Protocols in Manets Advances in Networks 2017; 5(2): 47-53 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20170502.13 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) QoS Based Evaluation of Multipath Routing

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Md. Zulfikar Alom 1, Tapan Kumar Godder 2, Mohammad NayeemMorshed 3, Student Member, IEEE 1,2 Department of Information & Communication

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS

Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS Information Management and Business Review Vol. 6, No. 3, pp. 115-120, Jun 2014 (ISSN 2220-3796) Multiprotocol Label Switching in Vehicular Ad hoc Network for QoS * Kashif Naseer Qureshi, Abdul Hanan Abdullah

More information

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU)

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU) LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS WU MINTAO (B.Eng.(Hons.), NTU) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

More information

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW Kirandeep Kaur 1, Mr.Pawan Luthra 2, Er.Gagandeep 3 1 Department of Computer Science and Engineering, Shaheed Bhagat Singh

More information

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1051-1058 Research India Publications http://www.ripublication.com Performance Comparison of Routing Protocols

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Performance Evaluation and Statistical Analysis of MANET routing Protocols for RPGM and MG

Performance Evaluation and Statistical Analysis of MANET routing Protocols for RPGM and MG Performance Evaluation and Statistical Analysis of MANET routing Protocols for RPGM and MG Prajakta M. Dhamanskar Fr. C.R.C.E., Mumbai Lecturer, IT Dept.India Dr. Nupur Giri V.E.S.I.T., Chembur Professor,

More information

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com

More information

Performance Comparison Study of AODV, OLSR and TORA Routing Protocols for MANETS

Performance Comparison Study of AODV, OLSR and TORA Routing Protocols for MANETS Performance Comparison Study of AODV, OLSR and TORA Routing Protocols for MANETS Manjeet Gupta 1 and *Sonam Kaushik 2 1 Assistant Professor, C.S.E,Kurukshetra University, JMIT(Radaur), Haryana, India 2

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

More information

IJMIE Volume 2, Issue 6 ISSN:

IJMIE Volume 2, Issue 6 ISSN: Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Overview (Advantages and Routing Protocols) of MANET

Overview (Advantages and Routing Protocols) of MANET Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

A Survey of Vehicular Ad hoc Networks Routing Protocols

A Survey of Vehicular Ad hoc Networks Routing Protocols International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords: Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Dr. Naveen Kr. Singh Ms. Neetu Sharma Ms. Shweta Agarwal Asso. Prof. Asstt. Prof. Asstt. Prof. ABES Engineering College ABES

More information

A Review paper on Routing Protocol Comparison

A Review paper on Routing Protocol Comparison A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna

More information

Performance Comparision of AODV, AOMDV, OLSR, DSR and GSR Routing Protocols in VANET

Performance Comparision of AODV, AOMDV, OLSR, DSR and GSR Routing Protocols in VANET Performance Comparision of AODV, AOMDV, OLSR, DSR and GSR Routing Protocols in VANET Mrs. Uma Nagaraj Department of Computer Engg. MAE, Alandi Pune, India Ms. Poonam P. Dhamal Department of Computer Engg.

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Performance Evaluation of Routing Protocols for MAC Layer Models

Performance Evaluation of Routing Protocols for MAC Layer Models IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network Neha Gupta Er. Manish Shrivastava Angad Singh Deptt. of IT Head of Deptt. of IT Assot. Professor Deptt. of IT LNCT BHOPAL INDIA Abstract

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India

More information